%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.03", %%% date = "25 April 2024", %%% time = "09:45:48 MST", %%% filename = "lncs2013a.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "http://www.math.utah.edu/~beebe", %%% checksum = "17475 1167 4614 54173", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "BibTeX; bibliography; Lecture Notes in %%% Computer Science", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is a bibliography of papers published in %%% Lecture Notes in Computer Science %%% (Springer-Verlag) for 2013 for volumes in %%% the range 7126--??. %%% %%% Bibliography entries below treat the series %%% as a journal, rather than as conference %%% proceedings. Article entries normally contain %%% DOI and/or URL values that lead to online %%% access to the article text, and book-DOI and/or %%% book-URL values that lead to the conference %%% proceedings volume, or monograph, in which the %%% article appears. %%% %%% The companion bibliography lncs.bib lists %%% just the individual volumes in the series, %%% and the lncswxyz*.bib files list individual %%% papers for specified volume ranges in year %%% wxyz. The large number of papers in this %%% collection, and limitations in TeX and %%% BibTeX, and in WWW HTTP transfer speeds, %%% necessitate the splitting of the papers %%% bibliographies into several separate files %%% for each year. %%% %%% At version 1.03, the year coverage looked %%% like this: %%% %%% 2013 ( 41) %%% %%% Article: 39 %%% Proceedings: 2 %%% %%% Total entries: 41 %%% %%% This bibliography has been constructed %%% primarily from the publisher Web site. %%% %%% Numerous errors in the sources noted above %%% have been corrected. Spelling has been %%% verified with the UNIX spell and GNU ispell %%% programs using the exception dictionary %%% stored in the companion file with extension %%% .sok. %%% %%% BibTeX citation tags are uniformly chosen as %%% name:year:abbrev, where name is the family %%% name of the first author or editor, year is a %%% 4-digit number, and abbrev is a 3-letter %%% condensation of important title words. %%% Citation labels were automatically generated %%% by software developed for the BibNet Project. %%% %%% In this bibliography, entries are sorted in %%% publication order, with the help of ``bibsort %%% -bypages''. The bibsort utility is available %%% at %%% %%% http://www.math.utah.edu/pub/bibsort %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{ "\ifx \undefined \bbb \def \bbb #1{\mathbb{#1}} \fi" # "\ifx \undefined \circled \def \circled #1{(#1)}\fi" # "\ifx \undefined \k \let \k = \c \fi" # "\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi" # "\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}}\fi" # "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi" # "\ifx \undefined \ocirc \def \ocirc #1{{\accent'27#1}}\fi" # "\ifx \undefined \reg \def \reg {\circled{R}}\fi" # "\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi" # "\hyphenation{ An-iso-tro-pic Ay-ka-nat Giun-chi-glia Lakh-neche Mal-er-ba Mart-el-li Reut-e-nau-er Thiel-sch-er Zheng-zhou }" } %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|http://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-LECT-NOTES-COMP-SCI = "Lecture Notes in Computer Science"} %%% ==================================================================== %%% Publisher abbreviations: @String{pub-SV = "Springer-Verlag Inc."} @String{pub-SV:adr = "New York, NY, USA"} %%% ==================================================================== %%% Series abbreviations: @String{ser-LNAI = "Lecture Notes in Artificial Intelligence"} @String{ser-LNCS = "Lecture Notes in Computer Science"} %%% ==================================================================== %%% Bibliography entries: entries are sorted in publication order with %%% `bibsort -bypages': @Article{Dodis:2013:OWE, author = "Yevgeniy Dodis and Yu Yu", title = "Overcoming Weak Expectations", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "1--22", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_1", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_1/; http://link.springer.com/content/pdf/bfm:978-3-642-36594-2/1.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Krenn:2013:CCR, author = "Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia", title = "A Counterexample to the Chain Rule for Conditional {HILL} Entropy", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "23--39", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_2", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_2/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Berman:2013:HPR, author = "Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor", title = "Hardness Preserving Reductions via Cuckoo Hashing", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "40--59", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_3", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_3/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Goyal:2013:CZK, author = "Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and Silas Richelson and Ivan Visconti", title = "Concurrent Zero Knowledge in the Bounded Player Model", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "60--79", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_4", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_4/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Canetti:2013:PCC, author = "Ran Canetti and Huijia Lin and Omer Paneth", title = "Public-Coin Concurrent Zero-Knowledge in the Global Hash Model", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "80--99", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_5", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_5/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Chase:2013:SMN, author = "Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn", title = "Succinct Malleable {NIZKs} and an Application to Compact Shuffles", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "100--119", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_6", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_6/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Gentry:2013:EMH, author = "Craig Gentry", title = "Encrypted Messages from the Heights of Cryptomania", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "120--121", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_7", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-36594-2_7?coverImageUrl=/static/0.8699/sites/link/images/abstract_cover_placeholder.png", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Boyen:2013:ABF, author = "Xavier Boyen", title = "Attribute-Based Functional Encryption on Lattices", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "122--142", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_8", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_8/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Brakerski:2013:WHB, author = "Zvika Brakerski", title = "When Homomorphism Becomes a Liability", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "143--161", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_9/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Applebaum:2013:GXG, author = "Benny Applebaum", title = "Garbling {XOR} Gates ``For Free'' in the Standard Model", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "162--181", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_10", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_10/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Bitansky:2013:WFS, author = "Nir Bitansky and Dana Dachman-Soled and Sanjam Garg and Abhishek Jain and Yael Tauman Kalai {\textellipsis}", title = "Why ``{Fiat--Shamir} for Proofs'' Lacks a Proof", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "182--201", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_11", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_11/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Ananth:2013:SFP, author = "Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao", title = "On the (In)security of {Fischlin}'s Paradigm", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "202--221", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_12", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_12/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Papamanthou:2013:SCC, author = "Charalampos Papamanthou and Elaine Shi and Roberto Tamassia", title = "Signatures of Correct Computation", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "222--242", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_13", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_13/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Asharov:2013:FCF, author = "Gilad Asharov and Yehuda Lindell and Tal Rabin", title = "A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "243--262", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_14", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_14/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Jeffs:2013:CCP, author = "R. Amzi Jeffs and Mike Rosulek", title = "Characterizing the Cryptographic Properties of Reactive $2$-Party Functionalities", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "263--280", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_15", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_15/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Fehr:2013:FCC, author = "Serge Fehr and Jonathan Katz and Fang Song and Hong-Sheng Zhou and Vassilis Zikas", title = "Feasibility and Completeness of Cryptographic Tasks in the Quantum World", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "281--296", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_16", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_16/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Mahmoody:2013:LEZ, author = "Mohammad Mahmoody and David Xiao", title = "Languages with Efficient Zero-Knowledge {PCPs} are in {SZK}", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "297--314", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_17", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_17/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Bitansky:2013:SNI, author = "Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Omer Paneth and Rafail Ostrovsky", title = "Succinct Non-interactive Arguments via Linear Interactive Proofs", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "315--333", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_18", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_18/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Pass:2013:USP, author = "Rafael Pass", title = "Unprovable Security of Perfect {NIZK} and Non-interactive Non-malleable Commitments", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "334--354", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_19", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_19/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Malkin:2013:SCB, author = "Tal Malkin", title = "Secure Computation for Big Data", journal = j-LECT-NOTES-COMP-SCI, volume = "7785", pages = "355--355", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-36594-2_20", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:32:49 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-36594-2_20?coverImageUrl=/static/0.8699/sites/link/images/abstract_cover_placeholder.png", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-36594-2", book-URL = "http://www.springerlink.com/content/978-3-642-36594-2", fjournal = "Lecture Notes in Computer Science", } @Article{Anonymous:2013:FM, author = "Anonymous", title = "Front Matter", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "??--??", year = "2013", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/content/pdf/bfm:978-3-642-38616-9/1.pdf", acknowledgement = ack-nhfb, book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Baldi:2013:ULC, author = "Marco Baldi and Marco Bianchi and Franco Chiaraluce and Joachim Rosenthal and Davide Schipani", title = "Using {LDGM} Codes and Sparse Syndromes to Achieve Digital Signatures", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "1--15", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_1", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_1/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Bernstein:2013:QAS, author = "Daniel J. Bernstein and Stacey Jeffery and Tanja Lange and Alexander Meurer", title = "Quantum Algorithms for the Subset-Sum Problem", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "16--33", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_2", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_2/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Bettaieb:2013:ILB, author = "Slim Bettaieb and Julien Schrek", title = "Improved Lattice-Based Threshold Ring Signature Scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "34--51", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_3", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_3/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Ding:2013:DRH, author = "Jintai Ding and Bo-Yin Yang", title = "Degree of Regularity for {HFEv} and {HFEv-}", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "52--66", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_4", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_4/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Guneysu:2013:SSR, author = "Tim G{\"u}neysu and Tobias Oder and Thomas P{\"o}ppelmann and Peter Schwabe", title = "Software Speed Records for Lattice-Based Signatures", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "67--82", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_5", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_5/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Laarhoven:2013:SSV, author = "Thijs Laarhoven and Michele Mosca and Joop van de Pol", title = "Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "83--101", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_6", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_6/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Landais:2013:EAM, author = "Gr{\'e}gory Landais and Jean-Pierre Tillich", title = "An Efficient Attack of a {McEliece} Cryptosystem Variant Based on Convolutional Codes", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "102--117", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_7", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_7/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Miura:2013:EAS, author = "Hiroyuki Miura and Yasufumi Hashimoto and Tsuyoshi Takagi", title = "Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "118--135", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_8", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_8/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Mosca:2013:QKD, author = "Michele Mosca and Douglas Stebila and Berkant Ustao{\u{g}}lu", title = "Quantum Key Distribution in the Classical Authenticated Key Exchange Framework", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "136--154", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_9/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Nie:2013:CHB, author = "Xuyun Nie and Zhaohu Xu and Johannes Buchmann", title = "Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "155--164", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_10", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_10/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Perlner:2013:CDI, author = "Ray Perlner and Daniel Smith-Tone", title = "A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "165--173", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_11", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_11/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Persichetti:2013:SAH, author = "Edoardo Persichetti", title = "Secure and Anonymous Hybrid Encryption from Coding Theory", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "174--187", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_12", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_12/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Petzoldt:2013:FVI, author = "Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann", title = "Fast Verification for Improved Versions of the {UOV} and Rainbow Signature Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "188--202", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_13", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_13/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Sendrier:2013:HCE, author = "Nicolas Sendrier and Dimitris E. Simos", title = "The Hardness of Code Equivalence over {$ \mathbb {F}_q $} and Its Application to Code-Based Cryptography", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "203--216", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_14", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_14/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Strenzke:2013:TAA, author = "Falko Strenzke", title = "Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "217--230", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_15", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_15/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Tao:2013:SMS, author = "Chengdong Tao and Adama Diene and Shaohua Tang and Jintai Ding", title = "Simple Matrix Scheme for Encryption", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "231--242", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_16", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_16/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Yasuda:2013:MSS, author = "Takanori Yasuda and Tsuyoshi Takagi and Kouichi Sakurai", title = "Multivariate Signature Scheme Using Quadratic Forms", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "243--258", year = "2013", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-38616-9_17", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_17/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } @Article{Anonymous:2013:BM, author = "Anonymous", title = "Back Matter", journal = j-LECT-NOTES-COMP-SCI, volume = "7932", pages = "??--??", year = "2013", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Fri Mar 21 08:01:29 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", URL = "http://link.springer.com/content/pdf/bbm:978-3-642-38616-9/1.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-38616-9", book-URL = "http://www.springerlink.com/content/978-3-642-38616-9", fjournal = "Lecture Notes in Computer Science", } %%% ==================================================================== %%% Cross-referenced entries must come last (sorted by year, and then %%% by citation label, with `bibsort -byyear': @Proceedings{Carette:2013:ICM, editor = "Jacques Carette and David Aspinall and Christoph Lange and Petr Sojka and Wolfgang Windsteiger", booktitle = "{Intelligent computer mathematics: MKM, Calculemus, DML, and Systems and Projects 2013, held as part of CICM 2013, Bath, UK, July 8--12, 2013. Proceedings}", title = "{Intelligent computer mathematics: MKM, Calculemus, DML, and Systems and Projects 2013, held as part of CICM 2013, Bath, UK, July 8--12, 2013. Proceedings}", volume = "7961", publisher = pub-SV, address = pub-SV:adr, pages = "xv + 384", year = "2013", DOI = "https://doi.org/10.1007/978-3-642-39320-4", ISBN = "3-642-39319-5 (paperback), 3-642-39320-9 (e-book)", ISBN-13 = "978-3-642-39319-8 (paperback), 978-3-642-39320-4 (e-book)", LCCN = "QA76.9.M35 I58 2013", bibdate = "Thu May 22 15:57:56 MDT 2014", bibsource = "fsz3950.oclc.org:210/WorldCat; http://www.math.utah.edu/pub/tex/bib/kepler.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib", series = "Lecture notes in computer science", acknowledgement = ack-nhfb, subject = "Informatique; Math{\'e}matiques; Congr{\`e}s; Intelligence artificielle; Computer science; Algebra; Data processing; Information storage and retrieval systems; Artificial intelligence; Text processing (Computer science", tableofcontents = "Calculemus: The rooster and the butterflies / Assia Mahboubi \\ Optimising Problem Formulation for Cylindrical Algebraic Decomposition / Russell Bradford, James H. Davenport, Matthew England, and David Wilson \\ The Formalization of Syntax-Based Mathematical Algorithms Using Quotation and Evaluation / William M. Farmer \\ Certification of bounds of non-linear functions: the templates mentod / Xavier Allamigeon, St{\'e}phane Gaubert, Victor Magron, and Benjamin Werner \\ Verifying a Plaftorm for Digital Imaging: A Multi-tool Strategy / Jonathan Heras, Gadea Mata, Ana Romero, Julio Rubio, and Rub{\'e}n S{\'a}enz \\ A Universal Machine for Biform Theory Graphs / Michael Kohlhase, Felix Manse and Florian Rabe \\ MKM: Mathematical Practice, Crowdsourcing, and Social Machines / Ursula Martin and Alison Pease \\ Automated Reasoning Service for HOL Light / Cezary Kaliszyk and Josef Urban \\ Understanding Branch Cuts of Expressions / Matthew England, Russell Bradford, James H. Davenport, and David Wilson \\ Formal Mathematics on Display: A Wiki for Flyspeck / Carst Tankink, Cezary Kaliszyk, Josef Urban, and Herman Geuvers \\ Determining Points on Handwritten Mathematical Symbols / Rui Hu and Stephen M. Watt \\ Capturing Hiproofs in HOL Light / Steven Obua, Mark Adams, and David Aspinall \\ A Qualitative Comparison of the Suitability of Four Theorem Provers for Basic Auction Theory / Christoph Lange, Marco B. Caminati, Manfred Kerber, Till Mossakowski, Colin Rowat, Makarius Wenzel, and Wolfgang Windsteiger \\ Students' Comparison of Their Trigonometric Answers with the Answers of a Computer Algebra System / Eno Tonisson \\ DML: Mathematics and the World Wide Web / Patrick D.F. Ion \\ Structural Similarity Search for Mathematics Retrieval / Shahab Kamali and Frank Wm. Tompa \\ Towards Machine-Actionable Modules of a Digital Mathematics Library: The Example of DML-CZ / Michal R{\^e}u\?zi\?cka, Petr Sojka, and Vlastimil Krej\?c\c \?r \\ A Hybrid Approach for Semantic Enrichment of MathML Mathematical Expressions / Minh-Quoc Nghiem, Giovanni Yoko Kristianto, Goran Topi{\'c}, and Akiko Aizawa \\ Three Years of DLMF: Web, Math and Search / Bruce R. Miller \\ Escaping the Trap of Too Precise Topic Queries / Paul Libbrecht \\ Using MathML to Represent Units of Measurement for Improved Ontology Alignment / Chau Do and Eric J. Pauwels \\ Systems and projects: A Web Interface for Isabelle: The Next Generation / Christoph L{\"u}th and Martin Ring \\ The ForMaRE Project--Formal Mathematical Reasoning in Economics / Christoph Lange, Colin Rowat, and Manfred Kerber \\ LATExml 2012--A Year of LATExml / Deyan Ginev and Bruce R. Miller \\ The MMT API: A Generic MKM System / Florian Rabe \\ Math-Net.Ru as a Digital Archive of the Russian Mathematical Knowledge from the XIX Century to Today / Dmitry E. Chebukov, Alexander D. Izaak, Olga G. Misyurina, Yuri A. Pupyrev, and Alexey B. Zhizhchenko \\ A Dynamic Symbolic Geometry Environment Based on the Gr{\"o}bnerCover Algorithm for the Computation of Geometric Loci and Envelopes / Miguel A. Ab{\'a}nades and Francisco Botana \\ ML4PG in computer algebra verification / J{\'o}nathan Heras and Ekaterina Komendantskaya \\ Pervasive Parallelism in Highly-Trustable Interactive Theorem Proving Systems / Bruno Barras, Lourdes del Carmen Gonz{\'a}lez Huesca, Hugo Herbelin, Yann R{\'e}gis-Gianas, Enrico Tassi, Makarius Wenzel, and Burkhart Wolff \\ The Web geometry laboratory project / Pedro Quaresma, Vanda Santos, and Seifeddine Bouallegue \\ swMATH--A New Information Service for Mathematical Software / Sebastian B{\"o}bisch, Michael Brickenstein, Hagen Chrapary, Gert-Martin Greuel, and Wolfram Sperber \\ Software for evaluating relevance of steps in algebraic transformations / Rein Prank \\ The DeLiverMATH project: text analysis in mathematics / Ulf Sch{\"o}nberg and Wolfram Sperber", xxseries = "Lecture notes in artificial intelligence; LNCS sublibrary. SL 7, Artificial intelligence", } @Proceedings{Gaborit:2013:PQC, editor = "Philippe Gaborit", booktitle = "{Post-quantum cryptography: 5th International Workshop, PQCRYPTO 2013, Limoges, France, June 4--7, 2013. Proceedings}", title = "{Post-quantum cryptography: 5th International Workshop, PQCRYPTO 2013, Limoges, France, June 4--7, 2013. Proceedings}", volume = "7932", publisher = pub-SV, address = pub-SV:adr, pages = "258 (est.)", year = "2013", DOI = "https://doi.org/10.1007/978-3-642-38616-9", ISBN = "3-642-38615-6 (paperback), 3-642-38616-4 (e-book)", ISBN-13 = "978-3-642-38615-2 (paperback), 978-3-642-38616-9 (e-book)", LCCN = "????", bibdate = "Fri Mar 21 07:55:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib; http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib; z3950.loc.gov:7090/Voyager", series = ser-LNCS, URL = "http://www.springerlink.com/content/978-3-642-38616-9", series-URL = "http://link.springer.com/bookseries/558", }